Ching-Yung Lin
Ching-Yung Lin
IBM Chief Scientist, Graph Computing
Verified email at - Homepage
Cited by
Cited by
Rotation, scale, and translation resilient watermarking for images
CY Lin, M Wu, JA Bloom, IJ Cox, ML Miller, YM Lui
IEEE Transactions on image processing 10 (5), 767-782, 2001
A robust image authentication method distinguishing JPEG compression from malicious manipulation
CY Lin, SF Chang
IEEE Transactions on Circuits and Systems for Video Technology 11 (2), 153-168, 2001
Semifragile watermarking for authenticating JPEG visual content
CY Lin, SF Chang
Security and Watermarking of Multimedia Contents II 3971, 140-151, 2000
Nisp: Pruning networks using neuron importance score propagation
R Yu, A Li, CF Chen, JH Lai, VI Morariu, X Han, M Gao, CY Lin, LS Davis
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
IBM Research TRECVID-2003 Video Retrieval System.
A Amir, J Argillander, M Campbell, A Haubold, G Iyengar, S Ebadollahi, ...
Semantic indexing of multimedia content using visual, audio, and text cues
WH Adams, G Iyengar, CY Lin, MR Naphade, C Neti, HJ Nock, JR Smith
EURASIP Journal on Advances in Signal Processing 2003 (2), 1-16, 2003
Robust image authentication method surviving JPEG lossy compression
CY Lin, SF Chang
Storage and Retrieval for Image and Video Databases VI 3312, 296-307, 1997
Searching for experts in the enterprise: combining text and social network analysis
K Ehrlich, CY Lin, V Griffiths-Fisher
Proceedings of the 2007 international ACM conference on Supporting group …, 2007
Generating robust digital signature for image/video authentication
CY Lin, SF Chang
Multimedia and Security Workshop at ACM Multimedia 98, 49-54, 1998
Personalized recommendation driven by information flow
X Song, BL Tseng, CY Lin, MT Sun
Proceedings of the 29th annual international ACM SIGIR conference on …, 2006
Using MPEG-7 and MPEG-21 for personalizing video
BL Tseng, CY Lin, JR Smith
iEEE Multimedia 11 (1), 42-52, 2004
Issues and solutions for authenticating MPEG video
CY Lin, SF Chang
Security and watermarking of multimedia contents 3657, 54-65, 1999
Distortion modeling and invariant extraction for digital image print-and-scan process
CY Lin, SF Chang
Int. Symp. Multimedia Information Processing, 1999
Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
JA Bloom, IJ Cox, ML Miller, M Wu, CY Lin, YM Lui
US Patent 6,282,300, 2001
Multimedia security technologies for digital rights management
W Zeng, H Yu, CY Lin
Elsevier, 2011
Method and apparatus for image authentication
SF Chang, CY Lin
US Patent 6,532,541, 2003
Information spreading in context
D Wang, Z Wen, H Tong, CY Lin, C Song, AL Barabási
Proceedings of the 20th international conference on World wide web, 735-744, 2011
Gbase: a scalable and general graph management system
U Kang, H Tong, J Sun, CY Lin, C Faloutsos
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
Passive-blind image forensics
TT Ng, SF Chang, CY Lin, Q Sun
Multimedia security technologies for digital rights management, 383-412, 2006
Smallblue: Social network analysis for expertise search and collective intelligence
CY Lin, N Cao, SX Liu, S Papadimitriou, J Sun, X Yan
2009 IEEE 25th International Conference on Data Engineering, 1483-1486, 2009
The system can't perform the operation now. Try again later.
Articles 1–20